From patchwork Fri Oct 18 15:12:17 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Akram Ahmad X-Patchwork-Id: 1999266 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=arm.com header.i=@arm.com header.a=rsa-sha256 header.s=selector1 header.b=rDTav/11; dkim=pass (1024-bit key) header.d=arm.com header.i=@arm.com header.a=rsa-sha256 header.s=selector1 header.b=rDTav/11; dkim-atps=neutral Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org (client-ip=8.43.85.97; helo=server2.sourceware.org; envelope-from=gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org; receiver=patchwork.ozlabs.org) Received: from server2.sourceware.org (server2.sourceware.org [8.43.85.97]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4XVSs62NY0z1xwD for ; Sat, 19 Oct 2024 02:13:46 +1100 (AEDT) Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id 8ACB53858283 for ; Fri, 18 Oct 2024 15:13:44 +0000 (GMT) X-Original-To: gcc-patches@gcc.gnu.org Delivered-To: gcc-patches@gcc.gnu.org Received: from EUR05-VI1-obe.outbound.protection.outlook.com (mail-vi1eur05on20622.outbound.protection.outlook.com [IPv6:2a01:111:f403:2613::622]) by sourceware.org (Postfix) with ESMTPS id 300943858C42 for ; Fri, 18 Oct 2024 15:13:16 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org 300943858C42 Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=arm.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=arm.com ARC-Filter: OpenARC Filter v1.0.0 sourceware.org 300943858C42 Authentication-Results: server2.sourceware.org; arc=pass smtp.remote-ip=2a01:111:f403:2613::622 ARC-Seal: i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1729264399; cv=pass; b=kJ8KSXTyFKLtfwr4FLaJfAm0zbiVhTqgAH1+KEFFKxZsXj2UNyFvE+K0o4xOCGmqi/LEeS0OzJUPwgHOnamANvXht/2vwH3xNTwANyCrk7F1M5Oob1saAaFl6oUAO1EFKisrH5WmoFrb4MpDHa2OzJipMB1p7D/DDGeyTOxA9Bk= ARC-Message-Signature: i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1729264399; c=relaxed/simple; bh=LDGnPJYFBk2ntqQgROpqBRokw+bJM7300By5bD23VF8=; h=DKIM-Signature:DKIM-Signature:From:To:Subject:Date:Message-ID: MIME-Version; b=pGYZQROi7anoVK21rlzfJoPD5m0FLXXsrtSuTOzM1b18LB8O7ZTJ95fbjoZf/wyCa1BALNGqK9xUOXiNkhCqnBDxaYbMCj4zyNt4ZeOup241BVWDaFjg28dsVTpulOl3ObVzGT16mt5ZRgwgDqyH2TLCwgaInzdMcoFSN+VfF9k= ARC-Authentication-Results: i=3; server2.sourceware.org ARC-Seal: i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass; b=q77guFgTMDpcg50wOdlfzby8l86spBsGLzxwPWpHbOAeaZNoYTVOrs9fKg6JIyS0ibk0ebmEiYvE2CiNZ+3JwO3zlmeVkuowMY0OqI2wZFm6ckHKyU6aKzneeJyuTu5r71ZAlQefLgpV5Vu2Dyjz0bnig9GJ2iC5EDZjsswOnpYH+WdoMlZ0b1FwT2sCMFxriOhvLbCnrJQ2E0RQd0bDU8XdHcssSXvXeimdZECPaBFgjOu/wCJE1udJasANgOVODFLBJe6aTcNA6HS6zj0g7dqsC0uquBzC4tH3MZXlpmV8tRywIt7sp8cg++Zh1tWi9LcV9shMpvC1RwBrNpJxKA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=OSn0i0SCxQ0v+f1+aYIVNbA3U86bInZBPdyCoiVR8rk=; b=HTZIOUolEznE6J63zxgX1beIfwgCcjtGOexjEkL79h506vuzNrAgKICkgrzxtYxbN5EQbdhUR05yjCdC20qBcAC2lIDQ4wfyQxcVEs5kr18SFrTq3bGqR8V6Znq4bSWoq+aXyOK/Osi12GkUfgXWtdzlDoQ08Dnkw/evFrWnveBXdXsU1a9ictA6KXk+V0pPbOIUZ0Nnb/P1Qn+4LUgrP0UzWlTEs4LVZmBsEch52AQQw9xYbnsGfrBHB0A7MZnYE3GBvx/hm6Xn9EzSsGbK9bIhvzguZP82FSnKKO2XXMG0Q8dLsQvJ5PvuaR7TrYByks0vDSWeSxv0AKUHIrmHCw== ARC-Authentication-Results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 63.35.35.123) smtp.rcpttodomain=gcc.gnu.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=arm.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dmarc=[1,1,header.from=arm.com]) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=OSn0i0SCxQ0v+f1+aYIVNbA3U86bInZBPdyCoiVR8rk=; b=rDTav/11DsT+dGUshDZvNkGB1e/o2+kPmGcD8jU2dXsbCqKbHYvVKhhM6012nPX1yraYeucVTKPz7nAUYpXQv7bjNu4VPsQNHthmBkU1n4ZwEOHKnSA6nm947H3ukXXVdJQjtbypQDshmJzRcNpqFWTuCGcN5viWJoeLNDBBy28= Received: from DU7P250CA0019.EURP250.PROD.OUTLOOK.COM (2603:10a6:10:54f::12) by VI1PR08MB10243.eurprd08.prod.outlook.com (2603:10a6:800:1bf::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8048.20; Fri, 18 Oct 2024 15:13:10 +0000 Received: from DU2PEPF00028D04.eurprd03.prod.outlook.com (2603:10a6:10:54f:cafe::34) by DU7P250CA0019.outlook.office365.com (2603:10a6:10:54f::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8069.19 via Frontend Transport; Fri, 18 Oct 2024 15:13:09 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=arm.com;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; pr=C Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DU2PEPF00028D04.mail.protection.outlook.com (10.167.242.164) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8069.17 via Frontend Transport; Fri, 18 Oct 2024 15:13:08 +0000 Received: ("Tessian outbound 5c9bb61b4476:v473"); Fri, 18 Oct 2024 15:13:08 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: ff9ad2238fd3e49d X-TessianGatewayMetadata: WSDhu7s3RNTd16jhWZMEajQkXYo4QnC29fwcRPIVBoaqaNcIgB+OAPzJ47S9vQQLmVuI7aqVTpOtn6e2Ys+ibeCHVdahCVNP4tSxtZD5R75j2K7ICujbD1/oCd2vKZnfKzlLRFUB2PRWPFCoDF7ZdL1Z9y4EB7XASUANC8RpiyU= X-CR-MTA-TID: 64aa7808 Received: from L3b38e05fb219.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 87DD4CC1-9A43-4D69-A803-3A0F8F32882B.1; Fri, 18 Oct 2024 15:12:57 +0000 Received: from EUR05-VI1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id L3b38e05fb219.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Fri, 18 Oct 2024 15:12:57 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=nN6nxk5XniRCrFy2aOhrXTYiSy+6+pG+r8kz5OPCwR1473L6QVVkwV/94yl/wXX3I5miiMgMYPxtPr0vsWOki0TsbyeEQcb/ak1+I8+ktLtpfD4GyipEDSnVmx7nkhrD0qtDfCGnbKFKgZZKKL7qkOnVTY3BgqpQGrKq/AsZpjxG/XOgZRgdZmYbqvoukzZIgDDatQHLFu/soz3b6EDgh0zYJfvv/JEKOSbuTTAmfKomZD4AG9nFIMYKQIvMD1tVQEzwS/Dr/dAaJs1l0GkTC2BC+Dl0Lkce8lAZM3OnpWCXOuEIEPwE82efzyii4mD1E7mI6TgfiFqq0icRkOczGg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=OSn0i0SCxQ0v+f1+aYIVNbA3U86bInZBPdyCoiVR8rk=; b=JxK1BLCq8JoaJFwbNRF9VdaeBGJgRC4WMtBE1pyc28/YDKwCTnlE2SGe9T6zJ1y3HtXKpX6lFuMbysGBICj8LMp9Wq+o/DYhIJRKJAGcMWnFLLfgjHQ9S6N0qPlN5GCJG3fFOJwPp6HZ5lm5KQJ1tRuEthHVkTj/n02L0qLV0GB3KHECHGzq8r+IyinkbrSZQFUCb2BhTT+XF+0ZeBzQDcQipIF4jez9cMAFDra1bS4/ETwsJSc0CXOcTbNUdGY1a8tRMG0ljE3UN7zHgx8n2FRF9IkICmKhdGDkggOr+f3q0v+qol4hQWkU/YbnZIwcHiGMv+dMLGHkvE+aCnNJXg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=gcc.gnu.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=OSn0i0SCxQ0v+f1+aYIVNbA3U86bInZBPdyCoiVR8rk=; b=rDTav/11DsT+dGUshDZvNkGB1e/o2+kPmGcD8jU2dXsbCqKbHYvVKhhM6012nPX1yraYeucVTKPz7nAUYpXQv7bjNu4VPsQNHthmBkU1n4ZwEOHKnSA6nm947H3ukXXVdJQjtbypQDshmJzRcNpqFWTuCGcN5viWJoeLNDBBy28= Received: from AS4P251CA0023.EURP251.PROD.OUTLOOK.COM (2603:10a6:20b:5d3::20) by DU0PR08MB9418.eurprd08.prod.outlook.com (2603:10a6:10:421::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8069.19; Fri, 18 Oct 2024 15:12:54 +0000 Received: from AM2PEPF0001C715.eurprd05.prod.outlook.com (2603:10a6:20b:5d3:cafe::65) by AS4P251CA0023.outlook.office365.com (2603:10a6:20b:5d3::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8069.23 via Frontend Transport; Fri, 18 Oct 2024 15:12:54 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; pr=C Received: from nebula.arm.com (40.67.248.234) by AM2PEPF0001C715.mail.protection.outlook.com (10.167.16.185) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.8069.17 via Frontend Transport; Fri, 18 Oct 2024 15:12:53 +0000 Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX03.Arm.com (10.251.24.31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Fri, 18 Oct 2024 15:12:52 +0000 Received: from ip-10-248-139-139.eu-west-1.compute.internal (10.252.78.54) by AZ-NEU-EX04.Arm.com (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39 via Frontend Transport; Fri, 18 Oct 2024 15:12:52 +0000 From: Akram Ahmad To: CC: Akram Ahmad Subject: [PATCH 0/2] aarch64: Use standard names for saturating arithmetic Date: Fri, 18 Oct 2024 15:12:17 +0000 Message-ID: <20241018151219.308512-1-Akram.Ahmad@arm.com> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-TrafficTypeDiagnostic: AM2PEPF0001C715:EE_|DU0PR08MB9418:EE_|DU2PEPF00028D04:EE_|VI1PR08MB10243:EE_ X-MS-Office365-Filtering-Correlation-Id: 7e97b263-3aee-4597-fefd-08dcef875faf x-checkrecipientrouted: true NoDisclaimer: true X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Untrusted: BCL:0; ARA:13230040|1800799024|36860700013|376014|82310400026; X-Microsoft-Antispam-Message-Info-Original: VOyrLXAnxwij86Fi+lozLkYXwdRiLtSYBTBzIar0VHCWacGWGOjf2GWjU0qLdocU1xywULOGwWQ0bo06uCiG03tqf5dcVhm4ZVYMyGJDPW13pEj8RqU67K3EyHTjHqx4S9O9WsIKzHXajpZ+g4Oznqz2cc8qWK9YU8POkUcrZTEy4BTlqMwc4qiTqBLs5MhI7FKj5h8QPsw1mVpXOEm94W1XVHHg1UxsdlD6R5MgT9NyDl07hk1HTfotTM8CAK8dkUWJJCV81dK8s/7m3faFHBtbKZziNmNVo3qcdnocNUbtQXh/QOYEphmGmXDX16H956lNnBNIr/mDAmPg/oBjddcIbJ3NQYRfaEegp4QaLPlaS5B081CnSM97u9Vb4GI90Nwn9EU2c3H05x+RQumu9B66mz51v6s8su2egjBSyaxy4PI8VahJ7zklgxNUIZ76swJzntD1QYPVdk5DWBpm7RNDZBAVT41Mn2428e0oOgXMQT0E1JDJThbrUqpNwDRuQ0BPAQKEEvgMrRN8SUJUNbTjNp8OwYQKJJ97MD+aiL/tOxPenUpHRlBplwOfPqOvIkwBkyyFwc/nvALxeg4Is4AgRSF7BR+KmaRthAxzSTszjEpSdlY/MIBlccR0qZySWcIZkuqvzwGtE7IaYubUsNN4J4tGxLu1HVtm0ai/pfoIynImMy1LLtmN7gQPCd6KOb6bS91PJw80k/ez44dS2boUfi0afOAshNIZJDhA1mxIJ3Gv1Bx4fWS7Q9MsqPrZu30fjFWcruDdDAwV+KBN4CKJyYEC5enRS5Y5uxLj3AGxF4bix+IMT11Kew/oawiPfuTGAa3QOekHLs79058x5Ck8DAlrKjFDPBgc2kfVGsBuEpVohuzm2y4KRQ41SGIBiljxF5883aoyKNhttgdnUonodKUOWFt95nGZSSKwlSihWr7Ez5D7V8fN8rJrByVXIaLEJEef8lCFM6A5AEpbel7AXydlOAXnqbJOX+hkUm9xlXoNOWi7CXUryFV0q0eUdZ8W9G7e3P/jXBqhIaLJOPnLdg84L8Nrcx+VaHorTk7RpCiQhZrNTVe11qCLlc/o6o4aXSk6YBxSmbSf9HTzvefTchqo5qRIgUrihchV+aMjTjJsPTqtw14BMpdYwEHZ5jYLvlgcPFP1wbjcMRNdDnm8b0G+7lDeuEoKO+hS6B4uF5c9Z4imkLna7iVg9EyZ3SHVCkSNvVYlXOMf0CIjRH5m4KP2BWwuQ9SvL33wHjmBTb96uDDhI45OuXAAt5FV8go01XM4hRgrmH9P6K4SKH5fVVzKWKewQxPDFTGfeJPy7fgAHU2iLhNmrW+7zWAf0qecqqUuHbkbNLohgHXfAPOUoqUMo6n3HzZQhjcVj8DQN48U0u7MteLhEPISIKPSK60X01pAc3pQdkdXJWe4GA== X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:nebula.arm.com; PTR:InfoDomainNonexistent; CAT:NONE; SFS:(13230040)(1800799024)(36860700013)(376014)(82310400026); DIR:OUT; SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: DU0PR08MB9418 X-MS-Exchange-SkipListedInternetSender: ip=[2603:10a6:20b:5d3::20]; domain=AS4P251CA0023.EURP251.PROD.OUTLOOK.COM X-MS-Exchange-Transport-CrossTenantHeadersStripped: DU2PEPF00028D04.eurprd03.prod.outlook.com X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id-Prvs: 0f05a62c-e7f8-4338-c1bf-08dcef875681 X-Microsoft-Antispam: BCL:0; ARA:13230040|36860700013|1800799024|35042699022|376014|82310400026; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(13230040)(36860700013)(1800799024)(35042699022)(376014)(82310400026); DIR:OUT; SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 18 Oct 2024 15:13:08.4760 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 7e97b263-3aee-4597-fefd-08dcef875faf X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: DU2PEPF00028D04.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB10243 X-Spam-Status: No, score=-4.6 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, FORGED_SPF_HELO, KAM_SHORT, SPF_HELO_PASS, SPF_NONE, TXREP, UNPARSEABLE_RELAY autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: gcc-patches@gcc.gnu.org X-Mailman-Version: 2.1.30 Precedence: list List-Id: Gcc-patches mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org Hi all, This patch series introduces standard names for scalar, Adv. SIMD, and SVE saturating arithmetic instructions in the aarch64 backend. Additional tests are added for unsigned saturating arithmetic, as well as to test that the auto-vectorizer correctly inserts NEON instructions or scalar instructions where necessary, such as in 32 and 64-bit scalar unsigned arithmetic. There are also tests for the auto-vectorized SVE code. An important discussion point: this patch causes scalar 32 and 64-bit unsigned saturating arithmetic to now use adds, csinv / subs, csel as is expected elsewhere in the backend. This affects the NEON intrinsics for these two modes as well. This is the cause of a few test failures, otherwise there are no regressions on aarch64-none-linux-gnu. SVE currently uses the unpredicated version of the instruction in the backend. Many thanks, Akram --- Akram Ahmad (2): aarch64: Use standard names for saturating arithmetic aarch64: Use standard names for SVE saturating arithmetic gcc/config/aarch64/aarch64-builtins.cc | 13 +++ gcc/config/aarch64/aarch64-simd-builtins.def | 8 +- gcc/config/aarch64/aarch64-simd.md | 93 +++++++++++++++++- gcc/config/aarch64/aarch64-sve.md | 4 +- gcc/config/aarch64/arm_neon.h | 96 +++++++++---------- gcc/config/aarch64/iterators.md | 4 + .../saturating_arithmetic_autovect.inc | 58 +++++++++++ .../saturating_arithmetic_autovect_1.c | 79 +++++++++++++++ .../saturating_arithmetic_autovect_2.c | 79 +++++++++++++++ .../saturating_arithmetic_autovect_3.c | 75 +++++++++++++++ .../saturating_arithmetic_autovect_4.c | 77 +++++++++++++++ .../aarch64/saturating_arithmetic.inc | 39 ++++++++ .../aarch64/saturating_arithmetic_1.c | 41 ++++++++ .../aarch64/saturating_arithmetic_2.c | 41 ++++++++ .../aarch64/saturating_arithmetic_3.c | 30 ++++++ .../aarch64/saturating_arithmetic_4.c | 30 ++++++ .../aarch64/sve/saturating_arithmetic.inc | 68 +++++++++++++ .../aarch64/sve/saturating_arithmetic_1.c | 60 ++++++++++++ .../aarch64/sve/saturating_arithmetic_2.c | 60 ++++++++++++ .../aarch64/sve/saturating_arithmetic_3.c | 62 ++++++++++++ .../aarch64/sve/saturating_arithmetic_4.c | 62 ++++++++++++ 21 files changed, 1021 insertions(+), 58 deletions(-) create mode 100644 gcc/testsuite/gcc.target/aarch64/advsimd-intrinsics/saturating_arithmetic_autovect.inc create mode 100644 gcc/testsuite/gcc.target/aarch64/advsimd-intrinsics/saturating_arithmetic_autovect_1.c create mode 100644 gcc/testsuite/gcc.target/aarch64/advsimd-intrinsics/saturating_arithmetic_autovect_2.c create mode 100644 gcc/testsuite/gcc.target/aarch64/advsimd-intrinsics/saturating_arithmetic_autovect_3.c create mode 100644 gcc/testsuite/gcc.target/aarch64/advsimd-intrinsics/saturating_arithmetic_autovect_4.c create mode 100644 gcc/testsuite/gcc.target/aarch64/saturating_arithmetic.inc create mode 100644 gcc/testsuite/gcc.target/aarch64/saturating_arithmetic_1.c create mode 100644 gcc/testsuite/gcc.target/aarch64/saturating_arithmetic_2.c create mode 100644 gcc/testsuite/gcc.target/aarch64/saturating_arithmetic_3.c create mode 100644 gcc/testsuite/gcc.target/aarch64/saturating_arithmetic_4.c create mode 100644 gcc/testsuite/gcc.target/aarch64/sve/saturating_arithmetic.inc create mode 100644 gcc/testsuite/gcc.target/aarch64/sve/saturating_arithmetic_1.c create mode 100644 gcc/testsuite/gcc.target/aarch64/sve/saturating_arithmetic_2.c create mode 100644 gcc/testsuite/gcc.target/aarch64/sve/saturating_arithmetic_3.c create mode 100644 gcc/testsuite/gcc.target/aarch64/sve/saturating_arithmetic_4.c